TechGenix is pleased to announce CloudComputingAdmin.com – a new site that offers a unique perspective on the quickly evolving world of cloud computing.
This article will focus on the importance of SIEM and why it is needed to achieve a higher level of security posture whilst hardening the core.
In this, Part 1 of our series on the evolution of Active Directory Rights Management Services, we provid an overview of what RMS is, how it works and some of the changes it has undergone from its release as an add-on for Windows Server 2003 back in 2005 to its incarnation in Windows Server 2012.
Cisco ASA 5500-X Series was selected the winner in the VPN Soluction category of the WindowSecurity.com Readers' Choice Awards. Barracuda SSL VPN and Checkpoint VPN-1 Power were runner-up and second runner-up respectively.
In this article we'll cover some of the GPO settings you can use to protect your computers from PTH attacks.
Event Log Consolidator allows you to view, consolidate, and dismiss event logs and correlate issues among multiple Windows systems quickly and easily from one central location.
Microsoft notifies that this vulnerability may allow an Elevation of Privilege attack but did not provide further technical details.